全文获取类型
收费全文 | 267篇 |
免费 | 9篇 |
国内免费 | 1篇 |
出版年
2021年 | 2篇 |
2019年 | 10篇 |
2018年 | 7篇 |
2017年 | 5篇 |
2016年 | 4篇 |
2014年 | 6篇 |
2013年 | 47篇 |
2012年 | 3篇 |
2010年 | 6篇 |
2007年 | 9篇 |
2006年 | 4篇 |
2005年 | 6篇 |
2004年 | 4篇 |
2002年 | 7篇 |
2000年 | 2篇 |
1999年 | 4篇 |
1998年 | 7篇 |
1997年 | 8篇 |
1996年 | 4篇 |
1995年 | 2篇 |
1994年 | 7篇 |
1993年 | 9篇 |
1992年 | 6篇 |
1991年 | 8篇 |
1990年 | 8篇 |
1989年 | 6篇 |
1988年 | 6篇 |
1987年 | 3篇 |
1986年 | 4篇 |
1985年 | 7篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1982年 | 5篇 |
1981年 | 5篇 |
1980年 | 3篇 |
1979年 | 4篇 |
1978年 | 4篇 |
1977年 | 3篇 |
1976年 | 3篇 |
1975年 | 3篇 |
1974年 | 3篇 |
1973年 | 4篇 |
1972年 | 3篇 |
1971年 | 1篇 |
1969年 | 2篇 |
1968年 | 5篇 |
1967年 | 2篇 |
1966年 | 3篇 |
1949年 | 1篇 |
1948年 | 2篇 |
排序方式: 共有277条查询结果,搜索用时 15 毫秒
131.
The current nuclear nonproliferation order is no longer sustainable. The Treaty on the Non-Proliferation of Nuclear Weapons (NPT) has weakened considerably over the years, with nuclear have-nots displaying increased dissatisfaction with the status quo. Meanwhile, demands for civilian nuclear technology have led to increased proliferation risks in the form of dual-use technologies. Arms control as we currently understand it—piecemeal treaties and agreements—is no longer sufficient to address the growing threat of proliferation and the frailty of the NPT. This article calls for a bolder nonproliferation agenda pursuing multilateral nuclear disarmament. Disarmament is, in fact, technologically achievable; a lack of political will stands as the only remaining roadblock to a world free of nuclear weapons. A better understanding of the technological feasibility of disarmament, as well as recognition of the diminishing strategic value of nuclear weapons, will help to erode this political reluctance. 相似文献
132.
Curtis H. Martin 《The Nonproliferation Review》2013,20(1):61-88
Scholarly and popular literature in the recent past has framed nonproliferation diplomacy toward both Iran and North Korea as an example of “good cop/bad cop,” a social-psychological strategy borrowed from law enforcement to describe a process for forcing a confession by subjecting a target to stressful emotional contrast. This article examines those two cases, roughly covering the period since 2003, when the most recent attempts to deal with the Iranian and North Korean proliferation threats began, in light of criteria for employment of the good cop/bad cop strategy. There is some evidence that within the framework of the six-party talks with North Korea and within the framework of the EU-3-U.S. diplomacy toward Iran, the players seeking nonproliferation have adopted good cop/bad cop roles to that end. The article concludes, however, that while there are similarities to the interrogation room technique, the complexity of the international political environment as compared to the interrogation room has prevented the states involved from successfully adopting or effectively exploiting good and bad cop roles. Substantial and exploitable differences of interest among them, and the availability of alternative “escape routes” for the target state, raise serious questions about the applicability of the good cop/bad cop strategy to these two nonproliferation cases, and even about its applicability in future nonproliferation challenges. 相似文献
133.
H. Sonmez Atesoglu 《Defence and Peace Economics》2013,24(1):55-60
This paper provides new evidence on the question of the effects of defense spending on aggregate output in the United States. Earlier studies of this basic issue relied on traditional econometric techniques and the neoclassical production function theory. In this paper, recently developed cointegration methodology and modeling that is inspired by new macroeconomic theory is employed. The results from earlier studies concerning the effects of defense spending are mixed. The findings presented in this paper reveal that there is a quantitatively important and positive relation between defense spending and aggregate output in the United States. 相似文献
134.
135.
Antoon W.J. Kolen Jan Karel Lenstra Christos H. Papadimitriou Frits C.R. Spieksma 《海军后勤学研究》2007,54(5):530-543
In interval scheduling, not only the processing times of the jobs but also their starting times are given. This article surveys the area of interval scheduling and presents proofs of results that have been known within the community for some time. We first review the complexity and approximability of different variants of interval scheduling problems. Next, we motivate the relevance of interval scheduling problems by providing an overview of applications that have appeared in literature. Finally, we focus on algorithmic results for two important variants of interval scheduling problems. In one variant we deal with nonidentical machines: instead of each machine being continuously available, there is a given interval for each machine in which it is available. In another variant, the machines are continuously available but they are ordered, and each job has a given “maximal” machine on which it can be processed. We investigate the complexity of these problems and describe algorithms for their solution. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
136.
A cycle time‐throughput (CT‐TH) curve, which quantifies the relationship of long‐run average cycle time to throughput rate, plays an important role in strategic planning for manufacturing systems. In this paper, a nonlinear regression metamodel supported by queueing theory is developed to represent the underlying CT‐TH curve implied by a manufacturing simulation model. To estimate the model efficiently, simulation experiments are built up sequentially using a multistage procedure. Extensive numerical experiments are presented to demonstrate the effectiveness of the proposed procedure. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
137.
William H. Ruckle 《海军后勤学研究》2007,54(5):492-496
In a rendez‐vous search two or more teams called seekers try to minimize the time needed to find each other. In this paper, we consider s seekers in a rectangular lattice of locations where each knows the configuration of the lattice, the distribution of the seekers at time 0, and its own location, but not the location of any other. We measure time discretely, in turns. A meeting takes place when the two seekers reach the same point or adjacent points. The main result is that for any dimension of lattice, any initial distribution of seekers there are optimal strategies for the seekers that converge (in a way we shall make clear) to a center. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
138.
139.
In 2000, Klein showed that bidirectional scheduling schemes (bidss) outperform single‐directional scheduling schemes (e.g., forward or backward schemes). In 2010, Yoosefzadeh, et al. [J Math Model Algor 9 (2010), 357–373] showed that depending on the nature of the problems and also the type of priority rules used, schedules produced by a so‐called tridirectional scheduling scheme (trdss) yields shorter makespans when compared to forward, backward, and even bidss. Since the justification technique is applied in many of the state‐of‐the‐art algorithms nowadays, we show that the tuned version of the trdss outperforms the double justification technique. Moreover, we investigate the circumstances under which the trdss is more probable to generate schedules with shorter makespans. To this end, we introduce a new measure of resource requirements and their distributions, namely total amount of overflows. Our analytical as well as empirical investigations show that when the new measure is increased, it is more probable to obtain schedules with shorter makespans using the trdss. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 61: 44–55, 2014 相似文献
140.
David H. Ucko 《Small Wars & Insurgencies》2014,25(1):161-179
The Western interventions in Iraq and Afghanistan have produced a heated polemic concerning the merits and demerits of counterinsurgency – the operational approach underpinning both campaigns. The two books reviewed here provide a good summation of the arguments against counterinsurgency: it is not a strategy and will fail when mistaken as such; its theory does not make intervention and war significantly easier; and even the most successful counterinsurgency campaigns have been bloody, violent, and protracted. Yet as this review highlights, beyond these central points, criticism of counterinsurgency is too often off the mark in its approach and totalizing in its pretentions. There is much to criticize and an urgent need to learn from past campaigns, yet bold claims and broad generalizations can mislead rather than enlighten. The analysis is particularly unhelpful when the definition of the central issue at hand – counterinsurgency – is being unwittingly or deliberately distorted. In the end, these two books form a poor basis for the debate that must now take place, because they are too ideological in tone, too undisciplined in approach, and therefore too unqualified in what they finally say. 相似文献